PT-2025-46473 · Microsoft · Host Process For Windows Tasks+1

Published

2025-11-11

·

Updated

2026-04-16

·

CVE-2025-60710

CVSS v3.1

7.8

High

AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Windows versions (affected versions not specified)
Description An issue exists that allows for local privilege escalation. The problem stems from improper link resolution before file access ('link following') within the Host Process for Windows Tasks. Specifically, the vulnerability resides in the handling of the C:Users%username%AppDataLocalCoreAIPlatform.00UKP directory and the deletion of directories matching the filter {????????-????-????-????-????????????} without verifying symbolic links. A low-privilege user can create directories within their %LOCALAPPDATA% folder, leading to arbitrary folder deletion under the NT AUTHORITYSYSTEM user context. This affects the MicrosoftWindowsWindowsAIRecallPolicyConfiguration scheduled task.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

LPE

Link Following

Weakness Enumeration

Related Identifiers

BDU:2025-14198
CVE-2025-60710

Affected Products

Host Process For Windows Tasks
Windows